From owner-freebsd-questions@FreeBSD.ORG Fri Oct 8 07:44:52 2004 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 3445E16A4CE for ; Fri, 8 Oct 2004 07:44:52 +0000 (GMT) Received: from web54004.mail.yahoo.com (web54004.mail.yahoo.com [206.190.36.228]) by mx1.FreeBSD.org (Postfix) with SMTP id AF9ED43D31 for ; Fri, 8 Oct 2004 07:44:51 +0000 (GMT) (envelope-from spamrefuse@yahoo.com) Message-ID: <20041008074451.37565.qmail@web54004.mail.yahoo.com> Received: from [147.46.44.181] by web54004.mail.yahoo.com via HTTP; Fri, 08 Oct 2004 00:44:51 PDT Date: Fri, 8 Oct 2004 00:44:51 -0700 (PDT) From: spam maps To: freebsd-questions@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Subject: Re: Protecting SSH from brute force attacks X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 Oct 2004 07:44:52 -0000 Vulpes Velox wrote: > On Thu, 7 Oct 2004 15:15:25 -0700 (PDT) > Luke wrote: > >>There are several script kiddies out there hitting >>my SSH server every day. Sometimes they attempt >>to brute-force their way in > > man login.conf for more info :) I'm just guessing, but are you trying to tell me that "login-retries" in login.conf is useful? I have tried that by setting it to 2, but it seems to have no effect on the sshd login behaviour. I always can try the password 6 times: $ ssh myname@my.own.pc Password: Password: Password: myname@my.own.pc's password: Permission denied, please try again. myname@my.own.pc's password: Permission denied, please try again. myname@my.own.pc's password: Permission denied (publickey,password,keyboard-interactive). $ So could you be a little more specific as to where login.conf is of help here? Thanks, Rob. _______________________________ Do you Yahoo!? Declare Yourself - Register online to vote today! http://vote.yahoo.com